MARCH 2020 A REPORT OF THE CSIS AEROSPACE SECURITY PROJECT
SPACE THREAT ASSESSMENT 2020
Principal Authors TODD HARRISON KAITLYN JOHNSON THOMAS G. ROBERTS TYLER WAY MAKENA YOUNG
Foreword MARTIN C. FAGA MARCH 2020
SPACE THREAT ASSESSMENT 2020
Authors TODD HARRISON KAITLYN JOHNSON THOMAS G. ROBERTS TYLER WAY MAKENA YOUNG
Foreword MARTIN C. FAGA
A REPORT OF THE CSIS AEROSPACE SECURITY PROJECT ABOUT CSIS
For over 50 years, the Center for Strategic and International Studies (CSIS) has worked to develop solutions to the world’s greatest policy challenges. Today, CSIS scholars are providing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organization headquartered in Washington, D.C. The Center’s 220 full-time staff and large network of affiliated scholars conduct research and analysis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M. Abshire and Admiral Arleigh Burke, CSIS was dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. Since 1962, CSIS has become one of the world’s preeminent international institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global health and econom- ic integration. Thomas J. Pritzker was named chairman of the CSIS Board of Trustees in November 2015. Former U.S. deputy secretary of defense John J. Hamre has served as the Center’s president and chief executive officer since 2000. CSIS does not take specific policy positions; accordingly, all views ex- pressed herein should be understood to be solely those of the author(s).
ABOUT ASP
The Aerospace Security Project (ASP) at CSIS explores the technological, budgetary, and policy issues related to the air and space domains and innovative operational concepts for air and space forces. Part of the Inter- national Security Program at CSIS, the Aerospace Security Project is led by Senior Fellow Todd Harrison. ASP’s research focuses on space security, air dominance, long-range strike, and civil and commercial space. Learn more at aerospace.csis.org.
ACKNOWLEDGMENTS
This report is made possible by general support to CSIS. No direct spon- sorship contributed to this report. The authors would like to thank Martin C. Faga, Brian Weeden, Victoria Samson, Emily Tiemeyer, Jeeah Lee, and Jacque Schrag for their support of this project.
© 2020 by the Center for Strategic and International Studies. All rights reserved.
Center for Strategic & International Studies 1616 Rhode Island Avenue, NW Washington, DC 20036 202-887-0200 | www.csis.org
II SPACE THREAT ASSESSMENT 2020 CONTENTS
IV FOREWORD
1 INTRODUCTION
2 TYPES OF COUNTERSPACE WEAPONS 3 Kinetic Physical 3 Non-Kinetic Physical 4 Electronic 4 Cyber 5 Threat Characteristics
8 CHINA 10 Space Organization and Doctrine 11 Counterspace Weapons 18 Summary
19 RUSSIA 20 Space Organization and Doctrine 21 Counterspace Weapons 28 Summary
29 IRAN 31 Space Organization and Doctrine 31 Counterspace Weapons 34 Summary
35 NORTH KOREA 37 Space Organization and Doctrine 38 Counterspace Weapons 40 Summary
41 INDIA 43 Space Organization and Doctrine 45 Counterspace Weapons 46 Summary
47 OTHERS 47 France 50 Israel 51 Japan 52 United Kingdom 52 Non-State Actors 53 Summary
54 WHAT TO WATCH
56 ABOUT THE AUTHORS
57 APPENDIX I
59 ENDNOTES
III FOREWORD
UCH IS SAID THESE DAYS about the possibility of conflict in space during, before, or perhaps, instead of conflict on land, at sea, or in the air. Why is this the case? The subject is discussed as though it emerged in the last 13 Myears since the Chinese demonstration of a kinetic ASAT in 2007. In fact, the United States was concerned in 1957 that Sputnik represented a precursor to space-based nuclear weapons. An ASAT program started in the United States in 1958, and the Soviets did similarly. Both superpowers deployed several ASAT systems and performed orbital tests. Nonetheless, fear on both sides of a serious threat of conflict in space did not emerge until recently. Both the Soviets and the United States under- stood that the satellites of “National Technical Means” were stabilizing and were keys to de-escalation should a conflict occur. This view changed after the First Gulf War, when space systems moved from being primarily stra- tegic systems to tactical ones providing near real-time support to tactical forces. By that time, the satellites of the Department of Defense and of the Intelligence Community operated and reported almost instantly, and the military services developed the equipment and techniques to acquire, ana- lyze, and distribute space system information very quickly. Following the First Gulf War, a Russian analysis of the rapid American suc- cess noted the efficacy of precision weapons and real-time intelligence. Much of this capability depended on space systems and spurred the Rus- sians and Chinese to a sustained program to develop ASAT capabilities--not only those for physical attack but cyber and electronic attacks as well. In recent years, we have read Russian and Chinese doctrine explaining the im- portance of ASAT capabilities, and we have seen systems deployed to carry them out. The situation we confront today was inevitable. Capability is always met with counter-capability. In recognition of this need to defend and to in- crease our space power in the face of such threats, the United States has wisely created the Space Force and the U.S. Space Command. This is where the people who will design, build, and operate our military space systems reside and where personnel will be trained, careers managed, doctrine de- veloped, and a myriad other elements of a military force undertaken. Several years ago, an Army general gave a speech where he said, “every company commander depends on space, and takes it for granted.” What a challenge for our Space Force and Space Command to assure that our mili- tary is served at every level of command without failing.
MARTIN C. FAGA Former Assistant Secretary of the Air Force for Space and Director of the National Reconnaissance Office
IV SPACE THREAT ASSESSMENT 2020 INTRODUCTION
HE PAST YEAR WAS A TRANSFORMATIONAL ONE for space pol- icy in several respects. On December 20, 2019, President Trump signed into law the National Defense Authorization Act for Fiscal Year 2020, creating the Space Force and ushering in what is ar- Tguably the most significant reorganization of the U.S. military since the Goldwater Nichols Act of 1986. While the newly created Space Force is re- sponsible for organizing, training, and equipping space forces for the U.S. military, the newly re-established United States Space Command is the geographic combatant command responsible for space operations. France also made significant organizational changes in 2019 with the is- suance of its Space Defense Strategy. It calls for the creation of a Space Command within the Air Force and the renaming of the Air Force to the Air and Space Force. The French defense minister publicly stated that France would develop space control capabilities and active defenses, such as small bodyguard satellites and space-based laser defenses to protect im- portant space assets. Other countries continue to develop and test counterspace capabilities and conduct suspicious or threatening activities in space. India became the fourth country to successfully test a direct-ascent anti-satellite (ASAT) missile, as well as the only country to conduct a debris-producing test since 2008. Rus- sia continued its co-orbital activities in geostationary orbit (GEO) and caught the attention of many in the space community with its proximity operations around a classified U.S. government satellite in low Earth orbit (LEO). In commercial space, both SpaceX and OneWeb began deployment of mega constellations in LEO to deliver high-speed internet access globally. OneWeb launched its first set of six satellites in February 2019, and SpaceX launched its first batch of 60 satellites in May 2019. Both companies have conducted additional launches since then, with SpaceX beginning to deploy at a steady pace in early 2020. As of February 17, 2020, SpaceX has launched a total of 302 Starlink satellites, 297 of which are operational. In comparison, the total number of operational satellites in LEO was roughly 1,500 in 2019—a number that could double by the end of 2020. These commercial developments pres- ent both opportunities and challenges in what is already a diverse, disruptive, disordered, and dangerous space environment. The purpose of this annual report from the CSIS Aerospace Security Project is to aggregate and analyze publicly available information on the counter- space capabilities of other nations. It is intended to raise awareness and un- derstanding of the threats, debunk myths and misinformation, and highlight areas in which senior leaders and policymakers should focus more attention. While the report focuses on the capabilities of China, Russia, Iran, North Ko- rea, and India, this year’s report places relatively more emphasis than previ- ous years on the counterspace capabilities of select other countries, includ- ing some allies and partners of the United States. This report is not a comprehensive assessment of all foreign counterspace capabilities because much of the information on what other countries are doing is not publicly available. The information in this report is current as of February 22, 2020.
1 COUNTERSPACE WEAPONS
TYPES OF COUNTERSPACE WEAPONS
PACE IS AN INCREASINGLY IMPORTANT ENABLER of economic and military power. The December 2017 United States National Security Strategy prioritizes maintaining U.S. leadership and free- dom of action in this critical domain, but it notes that: SMany countries are purchasing satellites to support their own strategic military activities. Others believe that the ability to attack space assets offers an asymmetric advantage and as a result, are pursuing a range of anti-satellite (ASAT) weapons. The United States considers unfettered ac- cess to and freedom to operate in space to be a vital interest. Any harmful interference with or an attack upon critical components of our space ar- chitecture that directly affects this vital U.S. interest will be met with a de- liberate response at a time, place, manner, and domain of our choosing.1 Illustration A ballistic missile can be used Counterspace weapons vary in the types of effects they create, and the level as a kinetic phys- of technological sophistication and resources required to develop and field ical counterspace them. They also differ in how they are employed and how difficult they are weapon. to detect and attribute. The effects of these weapons can be temporary or permanent, depending on the type of system and how it is used. The coun- try-by-country assessments that follow this section group counterspace weapons into four broad categories: kinetic physical, non-kinetic physical, electronic, and cyber.
2 SPACE THREAT ASSESSMENT 2020 both cases, the attacker is likely to know KINETIC PHYSICAL whether its attack is successful almost immediately because the effects would KINETIC PHYSICAL COUNTERSPACE be publicly visible through orbital debris weapons attempt to strike directly or or a damaged ground station. detonate a warhead near a satellite or ground station. A direct-ascent ASAT weapon attempts to strike a satellite us- ing a trajectory that intersects the target NON-KINETIC PHYSICAL satellite without placing the interceptor into orbit. Ballistic missiles and missile NON-KINETIC COUNTERSPACE weap- defense interceptors can be modified to ons, such as lasers, high-powered micro- act as direct-ascent ASAT weapons pro- wave (HPM) weapons, and electromag- vided they have sufficient energy to reach netic pulse (EMP) weapons, can have the target satellite’s orbit. A co-orbital physical effects on satellites and ground ASAT weapon differs from a direct-ascent stations without making physical con- weapon because it is first placed into or- tact. These attacks operate at the speed bit. When commanded, the satellite then of light and, in some cases, can be less maneuvers to strike its target. Co-orbital visible to third-party observers and more ASATs can remain dormant in orbit for difficult to attribute. days or even years before being activated. High-powered lasers can be used to dam- A key technology needed to make both di- age or degrade sensitive satellite com- rect-ascent and co-orbital ASAT weapons ponents, such as solar arrays. Lasers can effective is the ability to detect, track, and also be used to temporarily dazzle or per- guide the interceptor into a target satel- manently blind mission-critical sensors lite. An onboard guidance system requires on satellites. Targeting a satellite from a relatively high level of technological so- Earth with a laser requires high beam phistication and significant resources to quality, adaptive optics, and advanced test and deploy.2 pointing control to steer the laser beam Ground stations are vulnerable to kinetic as it is transmitted through the atmos- physical attacks by a variety of conven- phere—technology that is costly and re- 3 tional military weapons, from guided mis- quires a high degree of sophistication. A siles and rockets at longer ranges to small laser can be effective against a sensor on arms fire at shorter ranges. Because they a satellite if it is within the field of view of are often highly visible, located outside of the sensor, making it possible to attribute the United States, and are more accessi- the attack to its approximate geograph- ble than objects in space, ground stations ical origin. The attacker, however, will can be an easier target for adversaries have limited ability to know if the attack seeking to disrupt or degrade space sys- was successful because it would not likely tems. Even if the ground stations them- produce debris or other visible indicators. selves are difficult to attack directly, they An HPM weapon can be used to disrupt can be disrupted indirectly by attacking a satellite’s electronics, corrupt data the electrical power grid, water supply, stored in memory, cause proces- and the high-capacity communications sors to restart, and, at higher lines that support them. Kinetic physical attacks generally have irreversible effects on the satellites and ground stations targeted. These counter- space weapons are likely to be attributa- ble because the United States and others can identify the source of a direct-ascent ASAT launch or ground attack and can, Illustration A laser is an in theory, trace a co-orbital ASAT’s orbit- example of a non-kinetic al data back to its initial deployment. In counterspace weapon.
3 COUNTERSPACE WEAPONS
power levels, cause permanent damage range of angles on the ground.6 to electrical circuits and processors. A The technology needed to jam many front-door HPM attack uses a satellite’s types of satellite signals is commercial- own antennas as an entry path, while ly available and relatively inexpensive. a backdoor HPM attack attempts to en- Jamming is a reversible form of attack ter through small seams or gaps around because once a jammer is turned off, 4 electrical connections and shielding. communications return to normal. Jam- Because electromagnetic waves disperse ming can also be difficult to detect or and weaken over distance and the atmos- distinguish from accidental interference, phere can interfere with transmission at making attribution and awareness more high power levels, an HPM attack against difficult. In 2015, General John Hyten, a satellite is best carried out from anoth- then-commander of Air Force Space Com- er satellite in a similar orbit. Both front- mand, noted that the U.S. military was door and back-door HPM attacks can be unintentionally jamming its own commu- difficult to attribute to an attacker, and as nications satellites an average of 23 times with a laser weapon, the attacker may not per month.7 know if the attack has been successful. Spoofing is a form of electronic attack The use of a nuclear weapon in space can where the attacker tricks a receiver into be an indiscriminate form of non-kinetic believing a fake signal, produced by the physical attack. While a nuclear detona- attacker, is the real signal it is trying to re- tion would have immediate effects for ceive. Spoofing the downlink from a satel- satellites within range of its EMP, it also lite can be used to inject false or corrupted creates a high radiation environment that data into an adversary’s communications accelerates the degradation of satellite systems. If an attacker successfully spoofs components over the long term for un- the command and control uplink signal to shielded satellites in the affected orbital a satellite, it could take control of the sat- regime.5 ellite for nefarious purposes. Through a type of spoofing called “mea- coning,” even the encrypted military GPS ELECTRONIC signals can be spoofed. Meaconing does not require cracking the GPS encryption ELECTRONIC ATTACKS TARGET the because it merely rebroadcasts a time-de- means through which space systems layed copy of the original signal without 8 transmit and receive data by jamming decrypting it or altering the data. Like or spoofing radio frequency (RF) signals. jammers, once a spoofer is developed, it Jamming is a form of electronic attack is relatively inexpensive to produce and that interferes with RF communications deploy in large numbers and can be pro- liferated to other state and non-state ac- by generating noise in the same frequen- tors. cy band and within the field of view of the antenna on the targeted satellite or receiver. An uplink jammer interferes with the signal going from the Earth to a sat- CYBER ellite, such as the command and control uplink. Downlink jammers target the sig- UNLIKE ELECTRONIC ATTACKS, which nal from a satellite as it propagates down interfere with the transmission of RF sig- to users on the Earth. User terminals with nals, cyberattacks target the data itself omnidirectional antennas, such as many and the systems that use this data. The Illustration A truck-mounted GPS receivers and satellite phones, have antennas on satellites and ground sta- jammer is a type of electronic a wider field of view and thus are suscep- tions, the landlines that connect ground counterspace weapon. tible to downlink jamming from a wider stations to terrestrial networks, and the
4 SPACE THREAT ASSESSMENT 2020 user terminals that connect to satellites Counterspace weapons that are reversi- are all potential intrusion points for cy- ble, difficult to attribute, and have limited berattacks. Cyberattacks can be used to public awareness are ideally suited for sit- monitor data traffic patterns (i.e., which uations in which an opponent may want users are communicating), to monitor the to signal resolve, create uncertainty in the data itself, or to insert false or corrupted mind of its opponent, or achieve a fait ac- data in the system. While cyberattacks compli without triggering an escalatory require a high degree of understanding of response. For example, an adversary that the systems being targeted, they do not wants to deter the United States from in- necessarily require significant resources tervening in a situation may believe that Illustration to conduct. Cyberattacks can be contract- such attacks will stay below the threshold Cyberattacks can be ed out to private groups or individuals, for escalation (i.e., not trigger the very used to take control which means that a state or non-state ac- thing it is trying to prevent) while creating of a satellite and tor that lacks internal cyber capabilities significant operational challenges for the damage or destroy it. may still pose a cyber threat.9 United States that make the prospect of intervention more costly and protracted. A cyberattack on space systems can re- Conversely, counterspace weapons that sult in data loss, widespread disruptions, have limited battle damage assessment and even permanent loss of a satellite. or that risk collateral damage may be less For example, if an adversary can seize useful to adversaries in many situations. control of a satellite through a cyberat- Without reliable battle damage assess- tack on its command and control sys- ment, for example, an adversary cannot tem, the attack could shut down all com- plan operations with the confidence that munications and permanently damage its counterspace actions have been suc- the satellite by expending its propellant cessful. Furthermore, weapons that pro- supply or damaging its electronics and duce collateral damage in space, such as sensors. Accurate and timely attribution large amounts of space debris, run the of a cyberattack can be difficult, if not risk of escalating a conflict and turning impossible, because attackers can use a other nations against the attacker. variety of methods to conceal their iden- tity, such as using hijacked servers to launch an attack.
THREAT CHARACTERISTICS
The types of counterspace threats de- scribed above have distinctly different characteristics that make them more suitable for use in some scenarios than others. As shown in Table 1, some types of counterspace threats are difficult to attribute or have fully reversible effects, such as mobile jammers. High-powered lasers, for example, are “silent” and can carry out an attack with little public awareness that anything has happened. Other types of counterspace weapons produce effects that make it difficult for the attacker to know if the attack was successful, and some produce collateral damage that can affect space systems other than the one being targeted.
5 Table 1 TYPES OF COUNTERSPACE WEAPONS
Kinetic Physical Non-Kinetic Physical
High Altitude High- Ground Direct-Ascent High- Laser Dazzling Co-Orbital ASAT Nuclear Powered Station Attack ASAT Powered Laser or Blinding Detonation Microwave Types of Attack Types
Variable Can be Clear attribution attribution, Launch site can attributed by Launch site can Limited of the laser’s Limited depending on be attributed tracking previous- be attributed attribution location at the attribution
Attribution mode of attack ly known oribt time of attack
Reversible or Reversible or Irreversible or re- irreversible; irreversible; Irreversible Irreversible versible depend- Irreversible Irreversible attacker may or attacker may or ing on capabilities may not be able may not be able
Reversibility to control to control
May or May or Publicly known Only satellite Only satellite Only satellite may not be may not be depending on Publicly known operator will be operator will be operator will be publicly publicly trajectory aware aware aware
Awareness known known
Limited Limited Near real-time Near real-time Near real-time Near real-time confirmation of confirmation of No confirmation confirmation of confirmation of confirmation of confirmation of success if satellite success if satellite of success success success success success begins to drift begins to drift
Assessment uncontrolled uncontrolled Attacker Damage Damage Attacker
Station may Orbital debris Higher radiation Could leave Could leave target control multi- May or may not could affect levels in orbit target satellite satellite disabled ple satellites; produce orbital None other satellites in would persist for disabled and and uncontrol- potential for loss debris similar orbits months or years uncontrollable lable of life Collateral Damage Collateral
6 SPACE THREAT ASSESSMENT 2020 Electronic Cyber
Uplink Downlink Data Interccept Data Seizure Spoofing Jamming Jamming or Monitoring Corruption of Control Types of Attack Types
Modest attribution Modest attribution Modest attribution Limited or Limited or Limited or depending on mode depending on mode depending on mode uncertain uncertain uncertain of attack of attack of attack attribution attribution attribution Attribution
Irreversible or Reversible Reversible Reversible Reversible Reversible reversible, depending on mode of attack Reversibility
Satellite operator Satellite operator Satellite operator Satellite operator May or may not be May or may not be will be aware; may will be aware; may will be aware; may will be aware; may known to the known to the or may not be or may not be known or may not be known or may not be known public public
Awareness known to the public to the public to the public to the public
Limited confirmation of Limited Near-real time Near-real time Near-real time No confirmation success if monitoring confirmation of confirmation of confirmation of confirmation of of success of the local RF success if effects success success success environment is are visible Assessment possible Attacker Damage Damage Attacker
Only dirupts the Only disrupts the Only corrupts the Could leave target signals targeted and signals targeted and specific RF signals None None satellite disabled possible adjacent possible adjacent targeted and uncontrollable frequencies frequencies Collateral Damage Collateral
7 CHINA Number of Successful Orbital Launches in 201910 32
CHINA
“No force will stop N THE PAST DECADE, China has been barreling toward its lofty space or shake China or its goals. In the 2010s alone, China conducted over 200 successful orbital launches.12 China’s civil, military, and commercial capabilities are rapid- people from achieving ly growing, and its 2020 plans show that the country aims to launch over its goals” I60 satellites into orbit via 40 launches over the coming year.13 PRESIDENT XI JINPING, 201911 China’s civil space program is focused on its network of BeiDou position- ing, navigation, and timing (PNT) satellites, similar to the U.S. Global Posi- tioning System (GPS). China plans on launching two BeiDou satellites into geostationary orbit (GEO) in 2020 as well as further developing its Gaofen remote sensing satellite constellation. Since early 2019, Chang’e-4, the Chi- nese lunar lander mission that delivered a successful lunar rover called Yutu-2, has been conducting an exploration mission on the far side of the Moon. China plans to follow up this mission in late 2020 with Chang’e-5, a mission that aims to return samples from the Moon back to Earth for further study. To support its growing space capabilities, China has “built an expan- sive ground support infrastructure to support its growing on-orbit fleet and related functions including spacecraft and space launch vehicle (SLV) man- ufacture, launch, C2 [command and control], and data downlink.”14 China also intends to send a mission to Mars with an orbiter and probe. This mission will include 13 science payloads and is on track for a July 2020 launch.15 Three different launch vehicles are also scheduled to make their first flight in 2020: the Long March-5B, the Long March-7A, and the Long March-8.
8 SPACE THREAT ASSESSMENT 2020 The Long March-5B will be China’s heavy- lift workhorse, supporting future explora- JIUQUAN SATELLITE LAUNCH CENTER Active tion missions as well as the planned Chi- nese Space Station (CSS).16 The first test Inactive TAIYUAN SATELLITE LAUNCH CENTER launch of the -5B will likely take place in Orbital Human April 2020. If successful, it will be used to Launch launch the first section of the modular CSS. Cumulative Launches The Long March-8 is planned to be China’s first rocket with a reusable first stage and is 136 32 planned to support China’s growing com- 4 WENCHANG SATELLITE mercial space sector.17 Furthermore, “Chi- LAUNCH CENTER na aspires for a 2036 first human mission XICHANG SPACE CENTER to the moon.”18
China is continuing to move forward with a new modular space station. China has successfully operated two previous space labs in LEO, Tiangong 1 and Tian- gong 2, through its Project 921 program, Figure 1: Chinese National Spaceports. China currently has four active spaceports, which 20 which began in 1992. The new space have collectively launched hundreds of satellites and several taikonauts, or Chinese astronauts. station will consist of three modules. space-track.org / csis aerospace security28 The core module of the CSS passed final review but is facing possible launch de- lays. Currently, it is expected to launch in SUCCESSFUL ORBITAL LAUNCHES PER YEAR BY COUNTRY (1957-2019) 2020, while the two additional modules 20 CHINA are planned for launch between 2022 INDIA and 2024.21 Three or four manned mis- 00 USA RUSSIA sions and several cargo missions are also OTHERS planned, but launch delays have caused 0 schedules to slip for the entire program.22 The station is estimated to have a 10- 0 year lifespan, with the possibility of an extension.23 0
China is also expanding its international 20 cooperation. China hosted a selection process for opportunities to host scien- 0 tific payloads on the CSS. The final selec- 0 0 0 0 2000 20 0 20 tion was announced in 2019 and includes nine projects, involving “23 institutions from 17 Member States of the United Figure 2: Chinese Orbital Space Launches (1957-2019). China had more successful orbital Nations in Asian-pacific, European, Af- space launches in 2019 than any other nation. rican, North American and South Amer- space-track.org / csis aerospace security19 ican regions.”24 China has furthered its space partnership with Russia through cooperating to develop “Russia’s future Luna-26 lunar orbiter, China’s Chang’e-7 lunar polar lander, and a joint lunar and in order to keep pace with China’s grow- cial space companies grew from around deep space data center with a hub in ing national and commercial launch de- 30 in 2017 to over 100 in 2018. This growth each country.”25 mands.27 has led to the introduction of new com- China’s busiest launch site, the Xichang After a 2014 decree to allow private compa- mercial policies in 2019 in order to better Satellite Launch Center, hosted 19 of Chi- nies to develop SLVs, several new nominal- regulate the growing commercial space na’s 32 launches in 2019.26 Located in the ly private (though typically state-backed) launch sector.29 These regulations have south of China, Xichang is currently ex- Chinese companies began to develop and had a relatively positive response from panding by adding another launch pad test new launch vehicles. China’s commer- Chinese commercial companies.30
9 CHINA
This also builds on the 2015 Chinese white SPACE ORGANIZATION paper, which stated that “outer space AND DOCTRINE and cyberspace have become new com- manding heights in strategic competition 35 The Chinese government operates sepa- among all parties.” Many scholars inter- rate civil and military space organizations. preted this statement as a formal desig- The China National Space Administration nation of both space and cyberspace as 36 (CNSA) falls within the State Council’s new warfighting domains. To this end, State Administration for Science, Tech- the PLA founded the SSF to centralize and nology, and Industry for National Defense manage the military’s space, cyber, and (SASTIND) and is the primary organization electronic warfare missions. Before the for China’s civil space activities. The main 2015 reorganization, responsibilities for developer of national civil space technol- cyber, space, and electronic warfare were ogies is the China Aerospace Science and scattered across at least four different Technology Corporation (CASC), a state- PLA departments. The establishment of owned aerospace corporation. Meanwhile, the SSF indicates the PLA’s prioritization 37 military space activities are run through of these critical areas of warfare. the People’s Liberation Army (PLA). How- In 2018, China published an Outline of ever, each of these entities collaborate Training and Evaluation doctrine, which with one another on developing space THE SSF emphasized joint warfare training be- technologies.31 tween the different military services fo- In July 2019, China released its first offi- HAS BEGUN cused on combating “strong military op- cial defense white paper since 2015. Prior TRAINING ponents.”38 For the space domain, this is to this four-year gap, China had released likely directed against the United States. similar white papers about every two SPECIALIZED Originally, the SSF was not assessed to years. Analysts acknowledge that the 2019 have full control over China’s ASAT ca- document “adds little to previous official UNITS WITH pabilities. Experts believed that the re- reports on the details of recent reforms.”32 sponsibility for direct-ascent ASATs may In line with how China views the space DIRECT-ASCENT lie with either the PLA’s Rocket Force, domain, the 2019 white paper references which manages China’s nuclear arsenal, “outer space, electromagnetic space and ASAT WEAPONS. or the PLA’s Air Force.39 However, recent cyberspace” all as one national defense records show that the SSF has begun aim.33 China established the Strategic Sup- training specialized units with direct-as- port Force (SSF) in 2015 to bring the man- cent ASAT weapons capable of targeting agement of these strategic areas under satellites in LEO.40 one entity. Unlike the United States and According to the U.S-China Economic even Russia, the PLA appears to view these and Security Review Commission, Beijing three domains as inherently intertwined. has “sought to leverage military-civil fu- There is only one paragraph in the 2019 sion to commercialize its existing space white paper that focuses solely on the technology.” Utilizing civil or commercial space domain. It touts China’s activity in technologies to bolster or disguise its international fora on space-related issues, military space systems is a recognizable such as the UN Office for Outer Space Af- theme throughout China’s counterspace fairs. The white paper recognizes space as weapons program. “The goal of mili- of strategic importance to the nation and tary-civil fusion in China’s space sector states that “space security provides strate- is not primarily to develop cutting-edge gic assurance for national and social devel- technology but to produce existing tech- opment.”34 This rhetoric is consistent with nology that meets most customers’ needs other statements and posturing that China at a lower cost and at greater commercial has demonstrated in recent years. scale and efficiency.”41
10 SPACE THREAT ASSESSMENT 2020 COUNTERSPACE Table 2 WEAPONS DIRECT-ASCENT ASAT OR DUAL-USE TESTS
Weapons Kinetic Type Year Comments Kinetic Physical System Impact? Failed intercept of target. China has very capable kinetic physical ASAT test 2005 SC-19 First recorded test for a No. counterspace capabilities and has proven direct-ascent ASAT. this several times with a range of direct-as- ASAT test 2006 SC-19 Failed intercept of target. No. cent ASAT weapons tests. Thus far, China’s primary focus has been Yes, and targets in LEO, but recent created ASAT test 2007 SC-19 Successful intercept of target. thousands “China continues tests indicate China also of debris development of has a direct-ascent capa- on-orbit. bility able to reach GEO. multiple counterspace Reported successful technol- Missile de- It does not appear that ogy test against a suborbital capabilities designed fense test China has successfully 2010 SC-19 target. Likely “an effort to Yes. to degrade and deny (suborbit- tested a co-orbital ASAT 48 understand the homing per- al) 49 adversary use of space- capability, although it formance of the interceptor.” based assets during a has demonstrated sever- Reported successful technol- Missile de- Possibly ogy test against a suborbital crisis or conflict.” al of the technical capa- fense test 2013 Yes. SC-1950 target. Likely another tech- bilities required to con- (suborbital) U.S. OFFICE OF THE nology demonstration test.51 struct such a weapon. SECRETARY OF DEFENSE 42 China had its first suc- China declared the test as a cessful test of a kinetic high-altitude science mis- physical ASAT weapon in 2007, after two sion. U.S. military assessed ASAT test 2013 DN-2 No. previous failed tests.43 This test of a di- the test as proof Chinese rect-ascent SC-19 missile system targeted direct-ascent ASATs could reach targets up to GEO.52 and destroyed an aging Chinese meteor- ological satellite, producing over 3,000 China claimed it was a trackable pieces of debris in LEO. Around No. Possibly land-based missile intercep- done to test 2,800 trackable pieces of debris from this ASAT test 2014 SC-1953 tor test, while the United timing ca- test remain in orbit, with 11 pieces deor- States assessed the test as a pabilities.55 biting in 2019.44 This debris threatens the non-destructive ASAT test.54 safe operation of hundreds of other sat- China claimed it was a ellites in LEO, including the International land-based missile intercep- Space Station (ISS).45 ASAT test 2015 DN-356 tor test, while the United No. States assessed the test as a China has not conducted a debris-pro- non-destructive ASAT test.57 ducing direct-ascent ASAT test since 2007. Missile de- Unsuccessful test of the DN-3 2017 DN-3 No. However, analysts believe several other ki- fense test missile interceptor.58 netic physical tests—or suspected tests— DN-3 midcourse interceptor have occurred since then.46 These suspect- Missile de- DN-3 2018 successfully intercepted its Yes. fense test ed tests have not to date produced orbital DF-21 target.59 debris or threatened any orbiting satellite.47 Table 2 summarizes several Chinese ASAT, or suspected ASAT, tests. The missile tests tests have resulted in a verifiable destructive incident. Primarily, China has are harder to judge because they could also function as a counterspace capability been testing its rendezvous and proximity operations (RPO) capabilities, a during times of conflict. dual-use technology used to maneuver satellites in orbit near one another. Whether this maneuvering is for nefarious purposes, possibly making it China has also developed and launched several satellites which are testing tech- a co-orbital ASAT, or for peaceful purposes, such as for on-orbit servicing nologies that could be used for co-orbital or active debris removal missions, is unclear. Distinguishing the intent of counterspace capabilities. None of these the RPO movements is critical to determining whether or not a satellite is
11 CHINA a counterspace weapon, but determin- China has been testing these technol- be released and recovered during its mis- ing intent is almost impossible until a ogies for over a decade. For example, sion. According to official statements, the hostile action takes place. According to in 2008, a Chinese spacecraft deployed Aolong-1 was intended to test technolo- the U.S.-China Economic and Security a miniature imaging satellite, the BX- gies needed to collect and deorbit space Review Commission, “China’s testing 1, that was jettisoned from its mother debris. Experts have debated the success of RPOs has been similar to past U.S. spacecraft. It appears that the satellite of this test.69 tests, and no country has criticized RPOs was unable to be actively controlled un- The South China Morning Post reported in carried out by China as illegal or violating til after it had passed the International 2019 about recently declassified govern- any norm.” China, Russia, and the United Space Station. It is estimated that the ment documents which showcased how States all have satellites in GEO perform- uncontrolled satellite came within 25 decade-old Chinese satellite technology ing RPO activities around other satellites kilometers of the station. Despite many has provided a base for “the development 60 in orbit. reports in the United States claiming of new weapon systems powered by arti- that this was the first co-orbital ASAT ficial intelligence.” It is unclear how AI is test from China, the maneuver appears utilized, but the article reports that the to have been unintentional.62 new small satellites can be equipped with SJ-12, a Chinese satellite in LEO, conduct- robotic arms for active debris-removal ed a series of remote proximity maneuvers missions. This technology is, of course, with an older Chinese satellite, SJ-06F, in dual-use and could theoretically be used 2010. The maneuvers appeared to be slow, on a range of objects in orbit. The declas- methodical, and intentional and occurred sified document states that China has over several weeks in the summer of 2010.63 been developing and testing this tech- Some have speculated that this mission nology since 2008. Without elaborating was designed to test co-orbital jamming further, the document claims that the ro- or other counterspace capabilities, how- botic arm technology has also been incor- ever this has not been definitively proven porated into “drones, smart weapons and in an unclassified setting.64 At one point, robots.” The article also claims that these SJ-12 made contact with SJ-06F at low satellites could remain attached to the speed; however, this incident was “unlike- debris it collects “to avoid being tracked 70 ly to have resulted in debris or significant from the ground.” damage to either satellite.”65 Testing RPO On the same mission as Aolong-1, China capabilities may have been a test run for also deployed the Tianyuan-1 spacecraft, the 2011 docking of the Shenzhou space which according to Chinese press ac- capsule with the Tiangong-1 space station, counts successfully tested the ability to but the SJ-12 maneuver could have serious refuel other satellites while in orbit.71 This counterspace implications as well.66 test, as well as the Aolong-1 test, received significant media coverage in the United China has also been testing satellites with States due to its potential dual-use as robotic arms, a dual-use technology that ASAT weapons. could be used as a test bed for docking op- erations for China’s future space station, While none of China’s RPO activities in active debris removal missions, or a co-or- LEO or GEO appear to have damaged bital ASAT. In 2013, China claimed that “China has engaged in dual-use activ- other satellites, these technological ad- three new satellites were “conducting sci- ities such as rendezvous and proxim- vancements in RPO have many experts ity operations (RPO)—which demon- entific experiments on space maintenance 67 concerned about China’s intent. And un- strate co-orbital capabilities—that, technologies.” However, U.S. officials re- ported that the one satellite was equipped like Russian RPO activity, China’s RPO while not prohibited, create problems with a robotic arm, which tested its ability activities have been primarily focused on for U.S. national security.” to grapple and seize another satellite.68 other Chinese satellites. U.S.-CHINA ECONOMIC AND Three years later, in 2016, China launched China can also pose a threat to space SECURITY REVIEW COMMISSION61 the Aolong-1 spacecraft, which included a systems through its ability to attack the robotic arm and a sub-satellite that would ground stations that control satellites
12 SPACE THREAT ASSESSMENT 2020 Taking a Break, SJ-17’s with its conventional forces. China has the “The [People’s Liberation Army] largest standing army of any nation, and is also deploying directed-energy Lack of Movement over the past decade it has significantly increased its military budget and mod- weapons, and we expect them to SJ-17, A CHINESE SATELLITE in geosta- ernized its conventional military forces.75 field a ground-based laser system tionary orbit known for its unusual be- In a conflict, China could be capable of aimed at low-orbit space sensors by havior, appears to have put a pause on striking an adversary’s satellite ground next year.” its rendezvous and proximity operations stations with ballistic missiles, cruise mis- in 2019. Compared to its first two years siles, or long-range strike aircraft. As Chi- THEN-ACTING SECRETARY OF of operation, when the satellite appears DEFENSE PATRICK SHANAHAN76 na’s military reach continues to expand, it to have performed close approaches and will be able to use its conventional forces rendezvous operations with four Chi- to hold ground stations at risk over pro- nese satellites—Chinasats 5A, 6A, 20, and 1C—the lack of movement in 2019 is no- gressively greater distances. table. According to CSIS analysis, SJ-17 restarted RPO maneuvers with another Non-Kinetic Physical Chinese satellite in GEO, Chinasat 6B, in In 2018, then-U.S. Director of National In- late December 2019 and was still in an un- telligence Dan Coats assessed that China usually close orbit in late January 2020. is making advances in directed-energy In the past, SJ-17’s RPOs have lasted an- technology that can “blind or damage ywhere from a few weeks to over three sensitive space-based optical sensors, months.72 New analysis of SJ-17’s on-or- such as those used for remote sensing or bit activity also found that the satellite missile defense.”77 While this may sound spent significant time near an Indonesian like a major announcement of Chinese communications satellite, Telkom 3S, in capabilities, China had already demon- late 2017 and early 2018, but there has strated its ability to dazzle American sat- been no public statement from Indone- ellites in the mid-2000s. In 2006, reports sia on SJ-17’s maneuvering within 10km surfaced that U.S. imaging satellites were of its satellite. In a 2015 paper published illuminated by lasers over Chinese territo- in a Chinese research journal, scientists ry.78 Then-Director of the National Recon- Figure 3: Chinese Rendezvous and Prox- speculated that a small satellite could be naissance Office (NRO) Donald Kerr ac- imity Operations in GEO. Publicly availa- used to approach a large satellite in GEO knowledged that U.S. imagery satellites ble orbital positioning data suggests that in order to take high-quality pictures and Chinese satellite SJ-17 has made several quickly retreat or pass the target satellite were dazzled while passing over China close approaches and inspections in GEO. to minimize detection.73 While SJ-17 is by but stated that it did not “damage the U.S. 79 Learn more about SJ-17’s behavior, includ- no means a small satellite, it is possible satellite’s ability to collect information.” ing a list of the satellite’s nearest neighbors. that China is developing the skills and This incident demonstrates that China at aerospace.csis.org/SJ17. technology to accomplish such intelli- had much of the technology necessary to gence-gathering missions.74 field an operational capability to dazzle space-track.org / csis aerospace security
S N 200˚E N 20 20 150˚E
1 Chinasat 5A (China) ˚ 2 Chinasat 6A (China) 100˚E 3 Telkom 3S (Indonesia) 4 Chinasat 20 (China)
5 Chinasat 2C (China) 50˚E
6 Chinasat 1C (China)
7 Ekran 4 (Russia) 1 2 3 4 5 6 7 8 0˚E 8 Chinasat 6B (China) JAN 2017 JUL 2017 JAN 2018 JUL 2018 JAN 2019 JUL 2019
13 CHINA or blind a satellite back in 2006.80 Recent affect a satellite in orbit. Furthermore, a statements indicate that China has con- top Chinese weapons firm is developing tinued to build and field more capable synthetic diamonds, also likely for use directed-energy systems. As one China in directed-energy weapons. Diamonds CHINA IS LIKELY expert highlighted, “the only fundamen- can amplify and focus energy outputs to tal barrier to learning these abstract ele- better ensure that the energy beam is in- ALREADY ments [directed-energy] and achieving tense enough to damage targets.87 DEVELOPING a practical weapon capability is effort— Satellite imagery analysts speculated in 81 time, will, and money.” early 2019 that China had been develop- LASER Recently appointed Chief of Space Op- ing significant satellite lasing facilities.88 erations, General John J. Raymond not- Analysts speculate that China is pursu- WEAPONS AS ed in public remarks that, “we’re pretty ing these efforts in at least five different comfortable [in asserting] that they are locations across the country, due to the PART OF ITS developing directed energy weapons nature of the buildings and surrounding — probably building lasers to blind our infrastructure. One image even depicts a COUNTERSPACE satellites.”82 In early 2019, the Defense In- suspected electro-magnetic pulse (EMP) telligence Agency made a similar claim, simulator suspended between two struc- STRATEGY. stating “China likely is pursuing laser tures.89 However, no other analysts appear weapons to disrupt, degrade, or damage to have corroborated these assessments. satellites and their sensors and possibly China also announced an airborne laser already has a limited capability to employ in early 2020. While the details were con- 83 laser systems against satellite sensors.” fidential, the titles of two defense pro- Chinese military and technical writings curement bid requests may give insight have often referenced directed-energy on the PLA’s plans. The two bids request weapons as a key technology in a suc- the “procurement plan for airborne laser cessful counterspace strategy.84 The SSF attack pod” and a “price inquiry on pro- is comprised of both Chinese space forc- curement plan for controlling software es and electronic warfare-focused forces, module of laser attack platform.” The likely indicating that the PLA sees inter- system appears to be intended to target operability between these two areas of other aircraft or missiles, but similar tech- 90 warfare. Expert Mark Stokes testified that nology could be used to target satellites. “The PLASSF Network Systems Depart- While details from the PLA have been ment is central to China’s counterspace minimal and no public test has occurred mission.” Stokes went on to explain that on orbit, China has also shown inter- “Technical articles published . . . suggest est in developing HPM weapons for air the unit, at least in part, is responsible and missile defense. In January 2017, overseeing research, development, and Chinese media celebrated the work of acquisition of electronic counterspace expert Huang Wenhua, who developed systems.” These same units may also be a miniaturized HPM weapon capable responsible for research and develop- of being placed on a ship.91 However, ment and testing of high-powered micro- adding a mobile HPM system to a satel- wave systems.85 lite would require further reductions in In 2019, China surprisingly released an an- size, weight, and power in addition to a nouncement alongside images of a new number of other integration challenges directed-energy system. This Chinese unique to the space environment. laser gun is reportedly designed to focus As a nuclear power with intercontinental on small boats or drones.86 While not di- ballistic missiles (ICBMs), China also has rectly a counterspace weapon, some of the latent capability to launch a nuclear the technology would likely be similar weapon into LEO. The resulting EMP from for a higher-powered system that could the detonation would cause indiscrimi-
14 SPACE THREAT ASSESSMENT 2020 nate damage to satellites, creating a high added layer of defense, could conduct a “soft kill” by jamming level of radiation in LEO that could last for the drone’s communications and GPS.99 years.92 While China has the technology China has deployed military-grade truck-mounted jamming necessary to field a nuclear-armed ASAT equipment in its buildup of military installations in the man- weapon, it appears to be focusing its ef- made islands in the South China Sea. As of April 2018, U.S. offi- forts in other areas. cials confirmed that there are two islands in the Spratly Island chain that have been equipped with jamming systems for tar- Electronic geting communications and radar. This assessment was sup- In the late-1990s, China acquired foreign ported by satellite imagery that shows a suspected jamming ground-based satellite jamming equip- system on Mischief Reef in the Spratly Islands. While China has ment from Ukraine and has continued to been building military installations across the island chain since develop the technology independently in 2014, this is the first visual evidence of jamming equipment the ensuing decades.94 Currently, China there.100 Shortly after the identification of the jammers, Vietnam has the ability to jam common satellite condemned China’s continued militarization and weaponization “The PLA consid- communication bands and GPS signals, of the South China Sea and the Spratly Islands, also stating that ers EW [elec- and it has made the development and de- the jamming equipment violates international law.101 ployment of satellite jamming systems a tronic warfare] In 2018, the SSF even carried out advanced military exercises high priority.95 China is further developing simulating a complex electronic warfare environment with the capabilities jamming systems that will be able to tar- “SSF base pitted against five PLA Army, Air Force, and Rocket key assets for get a large range of frequencies of com- Force units.”102 modern warfare mercial SATCOM as well as U.S. military and its doctrine protected communication bands.96 China also reportedly developed a J-16D aircraft equipped with jamming systems. This aircraft, which suspiciously looks emphasizes Chinese technical writings have been like the U.S. Navy’s EA-18G Growler electronic attack fighter, is outspoken on how electronic warfare using EW weap- equipped with “several new antennas and conformal electron- may increase its advantage in a conflict ons to suppress ic-warfare arrays along the fuselage.” According to the Nation- with the United States. A paper from or deceive enemy al Interest, the “D” in J-16D comes from “diànzǐ,” the Chinese the China Electronic Technology Group equipment.” word for electronic.103 Corporation proposed solutions for DEFENSE INTELLIGENCE “overcoming the high-power require- AGENCY, CHALLENGES ments for jamming U.S. millimeter wave 93 TO SECURITY IN SPACE (MMW) satellite communications by using space-based jammers hosted on small satellites, in a ‘David versus Goli- Spoofing in the Port of Shanghai ath’ attack.” The authors further identi- INCIDENTS WERE REPORTED SPORADICALLY THROUGHOUT fied U.S. satellites that would be particu- 2018 and 2019 of the GPS signals for Automatic Identification larly susceptible to such an attack, like System (AIS) transponders being inaccurate in the main port of “the Advanced Extremely High Frequen- Shanghai. AIS signals broadcast the location, speed, and direc- 104 cy (AEHF), Wideband Global SATCOM tion of a ship, as required by international maritime law. Doc- (WGS), and Global Broadcast Service umented by a U.S. container ship, the Manukai, spoofing activi- (GBS) satellite constellations.”97 Another ties caused nearby ships’ signals to be misrepresented in ways that could have caused a serious disaster. For example, a nearby Chinese technical paper provides further docked ship’s signal was reported as traveling down the channel insight into how China plans to jam GPS toward the Manukai at significant speed. However, the captain of signals used by U.S. drones, such as the the Manukai could visually identify the ship in question as clearly RQ-4 Global Hawk, over the Spratly Is- docked and unmoving in a nearby slot at port. The incident did not lands and South China Sea.98 stop there throughout the day, while the Manukai was securely After the early 2020 U.S. drone strike on docked at port, its AIS signals were reporting the ship being over the Iranian general Qasem Soleimani, three miles away from its actual location. The Manukai reported a Chinese military analyst commented the incident to the U.S. Coast Guard which determined that there that China would be able to detect an were “no known anomalies that might affect GPS signal integrity incoming strike through its early warn- at the time and vicinity of the reported problem.”105 ing radars and anti-access/area denial Stunning for researchers is the peculiar circular shape of the plot (A2/AD) systems. He went on to say that of the spoofed ships and other GPS receivers in the area. Dubbed China would be able to shoot down the “crop circles” by confused researchers, this shape is unusual for drone with its air defenses and, as an GPS spoofing. According to Todd Humphries, a leading authority
15 CHINA on GPS jamming and spoofing, of the Radi- onavigation Laboratory at the University of Texas, Austin, declared “To be able to spoof multiple ships simultaneously into a circle is extraordinary technology.” It is extraor- dinary because a single attack appears to have been able to spoof several vessels simultaneously, each to a different inac- curate location.106 Furthermore, the D.C.- based research organization C4ADS also confirmed that civilian GPS was affected.
While the source of the spoofing remains unconfirmed, one expert traced the epi- center of the crop circle pattern to a non- operational smokestack near the port and speculates that it could be the origin of these GPS attacks.107 GPS jamming and spoofing requires a direct line of sight to the target receiver. Therefore, to max- imize impact and distance, many jam- ming devices are mounted on something Figure 4 (above): GPS Crop Circles Near Dalian China. Research organization Skytruth found with great height. For example, most mil- that two GPS interference locations around an oil terminal were active and had a dramatic itary-grade truck-mounted jammers are effect on scrambling vessel positions in the area on September 5, 2019. Some vessels were mounted on a tall radio tower that maxi- even shown to be far inland. “On the water many positions are appearing with very high speeds mizes the range of the effects. (over 25 knots, red) and it’s not possible to distinguish true and false locations. However, some Who is responsible? Again, this remains slow speed positions (green) are appearing at dock where they would be expected, so some AIS unclear. Early sources speculated that the broadcasts appear to be unaffected.” attacks are actually GPS hacking caused by skytruth / ais data courtesy of global fishing watch / orbcomm / spire. a non-state actor: sand smugglers.108 How- ever, the technology appears to be quite advanced, which researchers believe indi- Figure 5 (below): Map of Reported AIS Outages Depicting the Crop Circle Patterns. cates that the Chinese government may be behind these attacks. skytruth / ais data courtesy of global fishing watch / orbcomm / spire Another analyst, Bjorn Bergman, was in- trigued by the reports and found similar crop circle phenomena in at least 20 other locations along the Chinese coast. Berg- man assessed that 16 of these identified South Korea sites were oil terminals. A few of the other Japan sites were Chinese government installa- tions. Bergman assed that the oil termi- nals suggest that this could be an effort by the Chinese government to support Iran China through importing Iranian crude oil in vio- lation of sanctions.109 East China Sea Due to the proximity to oil terminals, Berg- man similarly assesses that the spoofing signals are being broadcast by the Chi- nese government.110 Similarly, Humphries believes it is unlikely that a non-state ac- Locations where GPS interference tor could have developed this highly ad- was detected in 2019 vanced technology.111
16 SPACE THREAT ASSESSMENT 2020 2005 Cyber U.S. Geological Survey NASA Through the SSF, NOAA China has been Indian Government integrating its LANDSAT-7 Private Industry Caused 12 minutes or more of advanced cyber interferrence capabilities with LANDSAT-7 Caused 12 minutes or more its counterspace and electronic warfare of interferrence
“The PLA unit responsible for con- operations. The U.S. Defense Intelligence JUNE ducting signals intelligence has sup- Agency assessed that: “The PLA could em- TERRA EARTH 2010 Took full control of the satellite ported cyberespionage against U.S. ploy its cyberattack capabilities to estab- but did not execute any lish information dominance in the early commands and European satellite and aerospace stages of a conflict to constrain an adver- OCTOBER industries since at least 2007.” TERRA EARTH sary’s actions, or slow its mobilization and Took full control of the satellite DEFENSE INTELLIGENCE AGENCY, deployment by targeting network-based but did not execute any commands CHALLENGES TO SECURITY IN SPACE112 command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR), logistics, and 113 UNIDENTIFIED commercial activities.” Attack forced NOAA to take down the system and stop transmitting Chinese hacks against secure govern- 2015 satellite images to the National ment networks to steal personal informa- Weather Service for two days tion and technical data are well known, but the country’s efforts to attack and infiltrate space systems has received VIDEO CHAT relatively less attention.114 Chinese writ- Took control of secure satellite video link for four to five minutes ings and research efforts indicate that U.S.-BASED SATELLITE & in a conflict it would attempt to conduct GEOSPATIAL IMAGERY COMPANIES cyberattacks against U.S. satellites and Hackers infiltrated satellite control ground stations.115 Specifically, “PLA mil- systems but did not execute any commands itary writings detail the effectiveness of 2020 information operations and cyberwarfare in modern conflicts, and advocate target- Figure 6: Timeline of Suspected Chinese ing an adversary’s Command and Control Cyber Interference with Space Systems. and logistics networks to affect the adver- various sources compiled by the sary’s ability to operate during the early aerospace security project stages of conflict.”116 China has already been implicated or suspected in several cyberattacks against 117 U.S. satellites. In October 2007 and steps required to command the satellite again in July 2008, cyberattacks believed but did not issue commands.”119 to originate in China targeted a remote A 2019 NASA Inspector General report ref- sensing satellite operated by the U.S. Ge- ological Survey called Landsat-7. These erences several Chinese cyber intrusions attacks are believed to have occurred into NASA, including a 2009 Chinese cy- through a ground station in Norway.118 berattack on the Joint Propulsion Labora- Each attack caused 12 or more minutes tory (JPL) which resulted in 22 gigabytes of interference with ground station com- of data being transferred to a Chinese IP munications, but the attackers did not address. Another transfer of data to Chi- gain control of the satellite. In June and nese IP addresses occured in 2011 when October of 2008, hackers also believed “intruders gained full access to 18 servers to be from China attacked the National supporting key JPL missions, including Aeronautics and Space Administration’s the DSN [Deep Space Network] and Ad- (NASA) Terra Earth observation satellite. vanced Spaceborne Thermal Emission In these attacks, the hackers “achieved all and Reflection Radiometer mission, and
17 CHINA sensitive user accounts.” The Advanced admit that “the hackers infected comput- illegal activities on its own coast or in the Spaceborne Thermal Emission and Re- ers that controlled the satellites, so that South China Sea. In 2020, it is likely that flection Radiometer mission is a joint pro- they could have changed the positions of satellite jamming and spoofing capabil- ject between NASA and Japan’s Ministry the orbiting devices and disrupted data ities will continue to be deployed and of Economy, Trade, and Industry.120 traffic.” While Symantec did not directly used in areas of gray zone conflict, such In September 2014, Chinese hackers at- blame the Chinese government for the at- as the South China Sea and perhaps even tacked National Oceanographic and At- tack, the company made it clear that the to deter protests in Hong Kong. mospheric Administration’s (NOAA) sat- well-coordinated attack originated from China’s cyberattacks against space sys- 125 ellite information and weather systems. the Chinese mainland. tems have either not been publicly dis- The attack forced NOAA to take down the Later in 2018, the United States charged cussed or did not occur in 2019. However, system and stop transmitting satellite im- two Chinese nationals for their involve- this does not mean China is incapable of ages to the National Weather Service for ment in a decade-long cyber theft pro- using cyber means to attack vulnerable two days before the organization was able gram, sponsored by the Chinese govern- space systems or has abandoned this line to seal off the vital data.121 After the attack ment. The program targeted aerospace of effort. was made public almost two months lat- industry companies, as well as NASA’s er, U.S. Representative Frank Wolf (R-VA) Goddard Center and JPL. However, spe- announced that NOAA had informed him cific details of attacks by this group re- that China was responsible for the hack main classified.126 on its systems. Chinese officials denied these claims, asserting that cyberattacks are common in today’s world.122 SUMMARY Anonymous sources in India leaked in October 2017 that a “high-profile govern- Overall, there appears to be an interest- ment meeting last month involving video ing shift in Chinese counterspace de- chat via satellite was compromised by velopments in 2019. Through the open- Chinese hackers”. The video was in Chi- source assessment above, it appears that nese control for four to five minutes be- China has paused, or at least slowed, de- fore Indian cybersecurity teams were able velopment and testing of its kinetic phys- to launch a counterattack and neutralize ical counterspace capabilities. This could the breach. The sources also claimed be because its kinetic ASAT capabilities that the attack was able to breach the are well developed or because kinetic nation’s “most sophisticated and secret physical counterspace weapons are overt link.” However, the sources note that the weapons that would likely draw a strong Indian response team was unable to con- international condemnation if ever used. clusively identify if the attack came from However, beginning in late December the Chinese government or non-state cy- 2019 and through early January 2020, 123 bercriminals. there is evidence that China’s inspector On June 19, 2018, several researchers at satellite, SJ-17, was moving around in Symantec—a U.S. software company— GEO, possibly signaling a return to opera- reported that a “sophisticated hacking tions after a hiatus of nearly a year.127 campaign launched from computers China is greatly increasing its develop- in China burrowed deeply into satellite ment, testing, and fielding of non-kinet- operators, defense contractors and tel- ic physical and electronic counterspace ecommunications companies.” The two weapons. The operational deployment targeted companies were U.S.-based of lasers capable of dazzling or blinding satellite companies, a DoD submarine U.S. satellites seems imminent, if it has contractor, and a U.S. geospatial imag- not occurred already. Furthermore, Chi- 124 ing company. The researchers could na is growing bolder with its electronic not determine exactly which systems had jamming and spoofing capabilities and been accessed in the breach, but they did may be using these technologies to hide
18 SPACE THREAT ASSESSMENT 2020 Number of Successful RUSSIA Orbital Launches in 2019128 25
RUSSIA
“[Russian] leader- ITH THE DISSOLUTION OF THE SOVIET UNION IN 1991, ship must be re- Russia inherited both the majority of the former state’s vast space infrastructure and its place among the global space stored [in the space powers.130 Since then, Russia has maintained a leading role domain]. This is Win the global space community by operating the third-largest number of not just a question satellites on orbit, serving as a critical partner in international human of prestige, but of spaceflight, and managing several of the world’s busiest spaceports—all national security.” while facing an inconsistent federal budgetary environment and claims of widespread internal corruption.131 By some metrics, Russia’s space DMITRY MEDVEDEV, FORMER activity pales in comparison to the Soviet Union, which launched more 129 RUSSIAN PRIME MINISTER payloads to orbit than all other countries combined before its collapse.132 Other measurements, however, such as launch vehicle reliability and hu- man spaceflight achievements, describe a formidable space actor with remarkable resilience in a rapidly changing space domain. As the only ISS partner agency with a human-rated launch vehicle, Russia is responsible for ferrying all astronauts to and from the space station us- ing its Soyuz rocket.133 Since the U.S. Space Shuttle’s final flight in 2011, Russia has launched 53 foreign astronauts to the ISS, including 34 Amer- icans.134 At over $80 million per seat, carrying passengers to orbit makes up 17 percent of the Russian space agency’s annual budget, according to leaked budget documents from 2018.135 For decades, NASA has had plans to develop a U.S. launch vehicle capable of transporting its astronauts to the ISS, lowering its dependence on the Russian Soyuz launch vehicle. With the first crewed flight test of the SpaceX Dragon capsule expected later this year as part of the U.S. Commercial Crew Program, the Russian space agency may soon find itself with many fewer human spaceflight customers compared to the past decade.136
19 RUSSIA SUCCESSFUL ORBITAL LAUNCHES PER YEAR BY COUNTRY (1957-2019)
Despite the geopolitical tensions on 20 CHINA Earth, Russia has pursued robust inter- INDIA national partnerships in the space do- 00 USA RUSSIA main in addition to its commitments as OTHERS part of the ISS agreement. For example, 0 the Russian space agency has entered into discussions with the China National 0 Space Administration to pursue coopera- 0 tive lunar exploration missions beginning in 2020.137 Since 2011, Russia has used the 20 low-latitude Guiana Space Centre oper- ated by the European Space Agency to 0 launch Soyuz rockets, making it the only 0 0 0 0 2000 20 0 20 country in the world to launch a native or- bital launch vehicle from a spaceport op- Figure 7: Russian Orbital Space Launches (1957-2019). erated by another space agency.138 Russia has also indicated its interest in continu- spacetrack.org / csis aerospace security148 ing its partnership with the United States after the ISS retires.139 While largely successful, the Russian space industry has also been plagued lift launch vehicle, and even land cosmo- When the Russian Ministry of Defense was with serious corruption scandals. In nauts on the Moon by 2030.144 The scale created in 1992, Russia established the 2018, Russia’s principal federal investi- of these new missions would almost cer- world’s first space force.149 Now known as gation authority discovered that fraud tainly require the country to increase its the Russian Space Forces subbranch—a cases within the country’s space and budget for space activities, likely putting part of the broader Russian Aerospace defense industry reached $1 billion.140 the space agency at odds with other fed- Forces—the Russian Space Force is re- Roscosmos, the Russian space agency, eral spending priorities.145 sponsible for launching military satellites, has been particularly wrought with cor- maintaining space-based assets, moni- ruption. Last year, a high-level agency toring space objects, and identifying po- official—who was likely linked to an in- tential attacks against the Russian home- ternal embezzlement scheme—fled the SPACE ORGANIZATION land from space.150 country to Europe while he was under AND DOCTRINE Russia considers the “intention to place investigation.141 Also in 2019, 58 peo- weapons in outer space” a main exter- ple received jail sentences after $172 Most state-sponsored space activities nal military danger and describes estab- million was stolen from the Vostoch- in Russia are linked to one of two gov- lishing “an international treaty on [the] ny spaceport in the Russian Far East.142 ernment organizations: Roscosmos, the prevention of placement of any types Only a fraction of the monies lost had country’s civilian space body, and the of weapons in outer space” as a princi- been recovered as of November 2019. Russian Aerospace Forces, the branch of pal task for the Russian state in its mil- When asked about the culture of cor- the Russian armed services tasked with itary doctrine.151 Although Russia and ruption at Roscosmos, the director of military operations in the space domain. China co-submitted the “Treaty on the the Russian Investigative Committee Roscosmos, known as the Russian Fed- Prevention of the Placement of Weap- said “there is no end in sight.”143 eral Space Agency until 2015, inherited ons in Outer Space, the Threat or Use of In light of these issues, Roscosmos has significant space infrastructure from its Force Against Outer Space Objects” to announced extravagant spaceflight plans predecessor, the Soviet space program.146 the Conference on Disarmament in 2008, for the upcoming decade. In a presenta- Tasked with the pursuit of international the United States dismissed the propos- tion to students at Moscow University cooperation with space partners around al as a “diplomatic ploy,” and refused to in May 2019, the agency’s director an- the world, Roscosmos is one of five prin- support it.152 In 2014, Russia and China nounced the country’s plans to invest in cipal partners that support the ISS, along reintroduced the treaty, prompting a a new crewed space vehicle with flights with civilian space agencies in the United similarly chilly reaction from the United to the ISS by 2023, develop a new heavy- States, Japan, Canada, and Europe.147 States. In response to the Indian ASAT
20 SPACE THREAT ASSESSMENT 2020 test in March 2019, the Russian Ministry weapon when it destroyed a domestic of Defense acknowledged India’s other- satellite in LEO using a co-orbital ASAT. wise strong dedication to preventing an Called Istrebitel Sputnikov (IS), mean- arms race in space while simultaneously ing “satellite destroyer” in Russian, the blaming the United States for creating an first Soviet co-orbital ASAT was tested 20 environment in which developing space times between 1963 to 1982, destroying actors are compelled to test anti-satel- several targets launched as part of the lite weapons on orbit—a clear jab at U.S. program.158 A follow-on version of the IS opposition to Russia and China’s failed system, known as IS-MU, was operational treaties.153 from 1991 to 1993.159 Although Russia’s military doctrine has not Prior to the fall of the Soviet Union, the been publicly updated since December country began developing a much more 2014, some analysts expect a new version capable co-orbital ASAT known as the may be released later this year.154 Since the Naryad. Reportedly designed to reach al- last military doctrine was released, Dmitry titudes as high as 40,000 km and contain Rogozin—the Roscosmos director general multiple warheads in a single launch, the and former deputy prime minister for de- Naryad would likely have posed a serious fense—has stated that Russia does not use threat to satellites in GEO.160 The system satellites to damage other space objects.155 saw limited testing—with just one launch More recently, Russian military leaders in 1994—and no confirmed intercepts.161 have suggested that the Trump adminis- Unlike the Soviet Union, Russia’s kinetic tration’s support of the U.S. Space Force physical counterspace arsenal includes warrants new “reciprocal and asymmetri- ground-launched direct-ascent ASAT cal measures” from Russia in the space do- missiles. In December 2018, Russia con- main.156 In a December 2019 address, Rus- ducted its seventh test of the PL-19/Nudol sian President Vladimir Putin stated that direct-ascent ASAT system.162 The PL-19/ the creation of a U.S. Space Force requires Nudol completed its first successful flight Russia to further invest in its own military test in November 2015, after two unsuc- space industry.157 cessful attempts.163 Unclassified U.S. re- ports suggest that both this launch, and a previous test in March 2018, used a mo- bile transporter erector-launcher (TEL) COUNTERSPACE within the Plesetsk Cosmodrome com- WEAPONS plex instead of a static launch pad.164 Al- though at least six of the seven launches Kinetic Physical are verified to have originated from Ple- setsk, a mobile launch system would the- Evidence suggests that Russia has in- oretically allow the ASAT to be launched vested in a sweeping range of kinetic outside of the Cosmodrome facility, en- physical counterspace capabilities over suring greater flexibility to target LEO sat- the past decade, including ground- and ellites in inclinations above 40 degrees as air-launched direct-ascent ASAT missiles they transit over Russian territory.165 capable of targeting satellites in LEO and Although not specifically designed as di- co-orbital ASAT weapons that could oper- rect-ascent ASAT weapons, Russian mo- ate in any orbital regime. Russia’s kinetic bile-launched S-400 surface-to-air mis- physical counterspace activities often siles—capable of reaching a maximum closely resemble previously operation- altitude of 200 km—could potentially al Soviet-era ASAT programs, suggesting reach a satellite in LEO. The follow-on that the country has benefited from dec- surface-to-air missile system, the S-500, is ades of ASAT weapons research conduct- expected to reach altitudes up to 300 km ed by the Soviet Ministry of Defense. if launched directly upward.166 Oleg Osta- On October 20, 1968, the Soviet Union be- penko, Russia’s former deputy minister came the second country in the world to of defense, once stated that the S-500 successfully demonstrate a counterspace will be able to intercept “low-orbital
21 RUSSIA satellites and space weapons.”167 First tested in 2018, the new missile’s pro- duction timeline has since slipped, and “there has been no indication of when an actual S-500 will be made availa- ble.”168 Like the PL-19/Nudol system, using the S-400 or eventually the S-500 as a direct-ascent ASAT would require a high-precision targeting capability that has yet to be demonstrated via a de- structive test.169 A modified Russian MiG-31 fighter jet was photographed in September 2018 carry- ing an unidentified missile that some re- ports suggest could be a “mock-up” of an air-launched ASAT weapon.170 Although er, likely deployed from the first as a sub- MiG-31BM “Foxhound” Aircraft on Septem- this development follows a 2013 state- satellite.175 The Russian Ministry of Defense ber 14, 2018. Photographed at the Zhuk- ment from the Russian Duma express- made a statement saying that the second ovsky airfield outside of Moscow, the aircraft ing the Russian government’s intent to is carrying what has since been identified as a satellite was designed to “inspect the state build an air-to-space system designed potential anti-satellite weapon. of a Russian satellite.”176 In October 2017, to “intercept absolutely everything that shipsash / jetphotos.com a third satellite was deployed from either flies from space,” the system depicted in the September 2018 photo would almost Cosmos 2519 or its subsatellite, resulting certainly be limited to targeting objects in three independent satellites in orbit. in LEO, due to its size.171 In 2017, a Rus- Over the course of several months, the sian Aerospace Forces squadron com- satellites engaged in a series of maneuvers mander confirmed that an ASAT missile and RPO exercises, including slow flybys, had been designed for use with the MiG- close approaches, and rendezvous. In 31BM aircraft—the same variant spotted February 2020, Chief of Space Operations 172 with the mysterious missile. Citing of the U.S. Space Force General John Ray- several sources familiar with a U.S. re- mond appeared to refer to one of these port on the new weapons system, CNBC three satellites when he said that Russian reported that the missile may become inspector satellites have “exhibited char- operational as soon as 2022.173 acteristics of a weapon.”177 Russia has not publicly announced the development of a new co-orbital ASAT Analysis published in Jane’s Intelligence program since the fall of the Soviet Un- Review used Russian procurement doc- ion. In the past few years, however, the umentation and contractor reports to Russian Aerospace Forces has launched connect Cosmos 2519, 2521, and 2523 a series of small “inspector” satellites in with the program name Nivelir.178 Con- LEO that have demonstrated some of the tracts signed in 2016 between the Nivelir technologies required to operate such a program and a Russian company known system. In 2017 and 2018, three small Rus- for developing radiation-absorbing ma- sian satellites—Cosmos 2519, 2521, and terials suggest that future Nivelir satel- 2523—engaged in RPO in LEO, prompting a statement of concern from the U.S. State lites—such as Cosmos 2535, 2536, 2537, Department.174 Although a June 2017 Rus- or 2538, all launched in July 2019—may sian Soyuz launch appeared to place just be coated with a protective film to avoid one satellite in LEO—Cosmos 2519—a sec- being tracked by optical or infrared sen- ond satellite was detected two months lat- sors from the ground or in space.179
22 SPACE THREAT ASSESSMENT 2020 Spying on a Spy Satellite Russia’s newest co-orbital system may be designed to target satellites in GEO.186 ON NOVEMBER 25, 2019, Russia Designated Burevestnik, this program will launched a small satellite, Cosmos 2543, likely employ low-thrust but highly-effi- into what the Russian Ministry of De- fense described as a “target orbit from cient electric propulsion to maneuver which the state of domestic satellites can lightweight satellites—possibly similar to be monitored.”180 Two weeks later, the those from the Nivelir program—around ministry announced that a subsatellite, the GEO belt.187 A report published in Cosmos 2542, had been deployed from 2019 indicated that a new ground con- Cosmos 2543.181 trol center was being built for Nivelir and Three days after its deployment, Cosmos Burevestnik at the same site the Soviets 2542 performed an orbital maneuver used to control the Istrebitel Sputnikov to synchronize its orbit with USA 245, missions in the 1960s.188 what is believed to be a U.S. National Although there is no evidence yet of light- Reconnaissance Office (NRO) satellite. weight Russian satellites maneuvering in Amateur satellite observers who record and share satellite observations online the GEO belt, a larger satellite has been noticed that USA 245 performed its own observed engaging in suspicious RPO ac- maneuver soon thereafter, possibly to tivity in the regime. The satellite—known steer clear of Cosmos 2542.182 In January as Olymp-K or Luch—has attracted atten- 2020, Cosmos 2542 maneuvered toward tion for shifting its position within the geo- the American spy satellite again, this synchronous belt on a relatively frequent 183 time coming as close as 50 km. A day basis, occupying at least 19 different posi- later, USA 245 made another maneuver, tions since its launch in September 2014.189 further distancing itself from the Russian Luch first attracted attention when it inspector satellite.184 repositioned itself between two satellites In an interview with SpaceNews, Gener- operated by Intelsat, a U.S. satellite com- al John Raymond, the Commander of munications company.190 Approaching U.S. Space Command and Chief of Space satellites in GEO in this manner could al- Operations of the U.S. Space Force, con- low for close inspection or potentially in- firmed the close approach, adding that terception of their communication links.191 he believed it was intentional.185 In September 2015, Luch approached a third Intelsat satellite.192 The interna- tional response escalated in September Figure 8: Orbital Trajectories for Cosmos 2542 and USA 245 on January 23, 2020. 2018, when French Minister of the Armed Since orbital parameters for classified satellites do not appear in the U.S. Space Com- Forces Florence Parly accused Russia of mand’s public catalog of space objects, analysts use observations from amateur astrono- committing “an act of espionage” after it mers to calculate USA 245’s orbital trajectory. approached a French-Italian military sat- nico janssen / satobs.org ellite “a bit too closely” in October 2017.
COSMOS 2542
USA 245
Antarctica
23 RUSSIA